Sciweavers

2269 search results - page 451 / 454
» Behavioral Intrusion Detection
Sort
View
WINET
2002
144views more  WINET 2002»
15 years 2 hour ago
Exposure in Wireless Sensor Networks: Theory and Practical Solutions
Wireless ad-hoc sensor networks have the potential to provide the missing interface between the physical world and the Internet, thus impacting a large number of users. This conne...
Seapahn Megerian, Farinaz Koushanfar, Gang Qu, Gia...
CGF
2010
142views more  CGF 2010»
14 years 11 months ago
Toward a Lagrangian Vector Field Topology
In this paper we present an extended critical point concept which allows us to apply vector field topology in the case of unsteady flow. We propose a measure for unsteadiness wh...
Raphael Fuchs, Jan Kemmler, Benjamin Schindler, J&...
95
Voted
ICRA
2010
IEEE
194views Robotics» more  ICRA 2010»
14 years 11 months ago
Through the development of a biomechatronic knee prosthesis for transfemoral amputees: Mechanical design and manufacture, human
— This paper presents the development of a biomechatronic knee prosthesis for transfemoral amputees. This kind of prostheses are considered ‘intelligent’ because they are abl...
Rafael R. Torrealba, Claudia Pérez-D'Arpino...
INFOCOM
2010
IEEE
14 years 10 months ago
Know Thy Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing
—Delay Tolerant Networks (DTN) are networks of self-organizing wireless nodes, where end-to-end connectivity is intermittent. In these networks, forwarding decisions are generall...
Theus Hossmann, Thrasyvoulos Spyropoulos, Franck L...
LATINCRYPT
2010
14 years 10 months ago
Mediated Traceable Anonymous Encryption
the full version of the extended abstract which appears in Latincrypt '10 (august 8-11, 2010, Puebla, Mexico) M. Abdalla and P. Barreto Eds., Springer-Verlag, LNCS 6212, pages...
Malika Izabachène, David Pointcheval, Damie...